CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.3 | $0-$5k | 0.00 |
A vulnerability, which was classified as problematic, was found in Vyper up to 0.3.9. Affected is the function _abi_decode
. The manipulation with an unknown input leads to a calculation vulnerability. CWE is classifying the issue as CWE-682. The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management. This is going to have an impact on integrity. CVE summarizes:
Vyper is a Pythonic Smart Contract Language for the EVM. The `_abi_decode()` function does not validate input when it is nested in an expression. Uses of `_abi_decode()` can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release `0.3.10`. Users are advised to reference pull request #3626.
The weakness was released 09/27/2023 as GHSA-cx2q-hfxr-rj97. The advisory is available at github.com. This vulnerability is traded as CVE-2023-42460 since 09/08/2023. Technical details are known, but there is no available exploit.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com.
Entry connected to this vulnerability is available at VDB-254807.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.3
VulDB Base Score: 3.1
VulDB Temp Score: 3.0
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔒
CNA Base Score: 5.3
CNA Vector (GitHub, Inc.): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: CalculationCWE: CWE-682
CAPEC: 🔒
ATT&CK: 🔒
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔒
Patch: github.com
Timeline
09/08/2023 CVE reserved09/27/2023 Advisory disclosed
09/27/2023 VulDB entry created
10/16/2023 VulDB entry last update
Sources
Advisory: GHSA-cx2q-hfxr-rj97Status: Confirmed
CVE: CVE-2023-42460 (🔒)
See also: 🔒
Entry
Created: 09/27/2023 17:45Updated: 10/16/2023 12:43
Changes: 09/27/2023 17:45 (49), 10/16/2023 12:43 (11)
Complete: 🔍
Cache ID: 18:159:103
No comments yet. Languages: en.
Please log in to comment.